Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 5

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  International security
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
Terrorist radicalisation has been broadly discussed in different research environments, and there are many different opinions about reasons why some people resort to such extreme acts of terrorism. In January 2015, the Kouachi brothers went into the satire company of Charlie Hebdo in France and killed 12 people, and in November the same year a group of terrorists killed 139 people in different attacks in Paris. There have been many terrorist attacks not only in European countries, but also around the world in general. It is not something new, but globalisation and closeness to the media make us more aware of the terror than earlier. The purpose of the paper is to argue, by using different theories within the terrorism studies, that network theory is not the most suitable way to understand terrorist radicalisation, but that different theories in general supplement each other. At the beginning terminology will be explained, followed by introducing network theory, comparing theories on the basis of different factors like understanding terrorist's background, and look at both internal and external factors that influence individuals. Subsequently, different theories will be compared on how well they explain the root causes for violent actions leading to final conclusions.
EN
The purpose of this article is to present and attempt to assess the implementation of security policy of Civic Platform submitted in its election programs since the first start in the parliamentary elections of this formation until the general election in October of 2015. There will be analyzed primarily in this article the manifestos prepared for the parliamentary elections because they contain much more contents about the security than the programmes prepared before the voting to the European Parliament.
EN
The paper presents the international law mechanism allowing to prosecute a state for electronic threats generated from its territory, directed against a foreign sovereign. It discusses the possibility to recognize a cyber-attack as an act of international aggression and shows it difficult at the present state of international debate. It than reaches to the traditional notion of state responsibility for the lack of due diligence as the source of states responsibility for cyber-attacks. Such due diligence should be conducted through sufficient criminal law regulation, properly executed in order to prevent electronic attacks. In order for a sufficient legal system of protection against cyberattacks to be created, an international debate, resulting in international guidelines, should be initiated. The results of such a debate would than allow for the uniformity of national criminal law regulations. As a starting point for such a debate a rough analysis of the Polish penal code rules, especially its Chapter XXXIII, has been presented. The Authors point to the need of an international debate on the system of protection against cyberattacks on key state electronic infrastructure, emphasizing however the already existent international obligation for states to take responsibility for attacks conducted form their territory.
EN
During the years 1989-1991, after a deep transformation of the internal system and the international order in Europe, Poland pursued a sovereign foreign policy. The new policy had the following general goals: 1) to develop a new international security system which would guarantee Poland's national security; 2) to gain diplomatic support for the reforms conducted in Poland, including primarily the transformation of the economy and its adaption to free market mechanisms, which were designed to result in economic growth; and 3) to maintain and increase the international prestige of Poland and the Poles, who had been the first to commence the struggle to create a democratic civil society in the Eastern bloc. Implementing this new concept of foreign policy, Poland entered the Council of Europe in November 1991. The following year, Warsaw started to strive for membership of NATO, which was achieved in March 1999. A few years later, Polish leaders pursued policies in which Poland played the role of a "Trojan horse" for the USA. This was manifested most clearly during the Iraqi crisis of 2003, and in the following years, particularly in 2005-2007. From spring 1990 Poland aspired to integration with the European Community; in December of the following year it signed an association agreement, which fully entered into force in February 1994. In the period 1998-2002 Poland negotiated successfully with the European Union and finally entered this Union in May 2004. In subsequent years Poland adopted an Eurosceptic and sometimes anti-EU position. The new Polish government, established after the parliamentary election of autumn 2007, moved away from an Eurosceptic policy and pursued a policy of engagement with European integration.
EN
The world is living in a state of constant psychological warfare, technological advances and development; in the 21st century Internet governance has become a puzzle for scientists and practitioners. Virtual warfare is an alternative to real warfare, one of the biggest threats to global security. In discussing the issue, we must consider the capabilities of the world’s leading countries, and first of all, identify the threat posed by Russia, which is the core of unpredictable aggression. This state is trying to influence almost the whole world with large-scale cyber-hacking attacks and continuous disinformation and fake news. Today it is difficult to find out where the theoretical war begins and where the practical military aggression ends, so new research, recommendations, scientific papers, and defence strategies are needed. Defensive mechanisms are created for cyber-attacks and this is always followed by more powerful attacks; that is why NATO enacted Article 5 of the Washington Treaty or the principle of “collective defence.” The article discusses Russia’s aggressive policy towards Georgia during and after the Russian-Georgian war in August 2008. The features of the Russian hybrid war and cyber attacks are discussed.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.